Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
03/02/2024, 18:31
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.roblox.com/home
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://www.roblox.com/home
Resource
win10v2004-20231222-en
General
-
Target
https://www.roblox.com/home
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3888 msedge.exe 3888 msedge.exe 1356 msedge.exe 1356 msedge.exe 3696 identity_helper.exe 3696 identity_helper.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1356 wrote to memory of 4868 1356 msedge.exe 85 PID 1356 wrote to memory of 4868 1356 msedge.exe 85 PID 1356 wrote to memory of 1068 1356 msedge.exe 90 PID 1356 wrote to memory of 1068 1356 msedge.exe 90 PID 1356 wrote to memory of 1068 1356 msedge.exe 90 PID 1356 wrote to memory of 1068 1356 msedge.exe 90 PID 1356 wrote to memory of 1068 1356 msedge.exe 90 PID 1356 wrote to memory of 1068 1356 msedge.exe 90 PID 1356 wrote to memory of 1068 1356 msedge.exe 90 PID 1356 wrote to memory of 1068 1356 msedge.exe 90 PID 1356 wrote to memory of 1068 1356 msedge.exe 90 PID 1356 wrote to memory of 1068 1356 msedge.exe 90 PID 1356 wrote to memory of 1068 1356 msedge.exe 90 PID 1356 wrote to memory of 1068 1356 msedge.exe 90 PID 1356 wrote to memory of 1068 1356 msedge.exe 90 PID 1356 wrote to memory of 1068 1356 msedge.exe 90 PID 1356 wrote to memory of 1068 1356 msedge.exe 90 PID 1356 wrote to memory of 1068 1356 msedge.exe 90 PID 1356 wrote to memory of 1068 1356 msedge.exe 90 PID 1356 wrote to memory of 1068 1356 msedge.exe 90 PID 1356 wrote to memory of 1068 1356 msedge.exe 90 PID 1356 wrote to memory of 1068 1356 msedge.exe 90 PID 1356 wrote to memory of 1068 1356 msedge.exe 90 PID 1356 wrote to memory of 1068 1356 msedge.exe 90 PID 1356 wrote to memory of 1068 1356 msedge.exe 90 PID 1356 wrote to memory of 1068 1356 msedge.exe 90 PID 1356 wrote to memory of 1068 1356 msedge.exe 90 PID 1356 wrote to memory of 1068 1356 msedge.exe 90 PID 1356 wrote to memory of 1068 1356 msedge.exe 90 PID 1356 wrote to memory of 1068 1356 msedge.exe 90 PID 1356 wrote to memory of 1068 1356 msedge.exe 90 PID 1356 wrote to memory of 1068 1356 msedge.exe 90 PID 1356 wrote to memory of 1068 1356 msedge.exe 90 PID 1356 wrote to memory of 1068 1356 msedge.exe 90 PID 1356 wrote to memory of 1068 1356 msedge.exe 90 PID 1356 wrote to memory of 1068 1356 msedge.exe 90 PID 1356 wrote to memory of 1068 1356 msedge.exe 90 PID 1356 wrote to memory of 1068 1356 msedge.exe 90 PID 1356 wrote to memory of 1068 1356 msedge.exe 90 PID 1356 wrote to memory of 1068 1356 msedge.exe 90 PID 1356 wrote to memory of 1068 1356 msedge.exe 90 PID 1356 wrote to memory of 1068 1356 msedge.exe 90 PID 1356 wrote to memory of 3888 1356 msedge.exe 88 PID 1356 wrote to memory of 3888 1356 msedge.exe 88 PID 1356 wrote to memory of 5080 1356 msedge.exe 89 PID 1356 wrote to memory of 5080 1356 msedge.exe 89 PID 1356 wrote to memory of 5080 1356 msedge.exe 89 PID 1356 wrote to memory of 5080 1356 msedge.exe 89 PID 1356 wrote to memory of 5080 1356 msedge.exe 89 PID 1356 wrote to memory of 5080 1356 msedge.exe 89 PID 1356 wrote to memory of 5080 1356 msedge.exe 89 PID 1356 wrote to memory of 5080 1356 msedge.exe 89 PID 1356 wrote to memory of 5080 1356 msedge.exe 89 PID 1356 wrote to memory of 5080 1356 msedge.exe 89 PID 1356 wrote to memory of 5080 1356 msedge.exe 89 PID 1356 wrote to memory of 5080 1356 msedge.exe 89 PID 1356 wrote to memory of 5080 1356 msedge.exe 89 PID 1356 wrote to memory of 5080 1356 msedge.exe 89 PID 1356 wrote to memory of 5080 1356 msedge.exe 89 PID 1356 wrote to memory of 5080 1356 msedge.exe 89 PID 1356 wrote to memory of 5080 1356 msedge.exe 89 PID 1356 wrote to memory of 5080 1356 msedge.exe 89 PID 1356 wrote to memory of 5080 1356 msedge.exe 89 PID 1356 wrote to memory of 5080 1356 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.roblox.com/home1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffba94046f8,0x7ffba9404708,0x7ffba94047182⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,18397259977505722053,8739065295933855201,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,18397259977505722053,8739065295933855201,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,18397259977505722053,8739065295933855201,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2252 /prefetch:22⤵PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,18397259977505722053,8739065295933855201,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,18397259977505722053,8739065295933855201,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,18397259977505722053,8739065295933855201,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:12⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,18397259977505722053,8739065295933855201,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5492 /prefetch:82⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,18397259977505722053,8739065295933855201,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5492 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,18397259977505722053,8739065295933855201,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,18397259977505722053,8739065295933855201,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,18397259977505722053,8739065295933855201,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:12⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,18397259977505722053,8739065295933855201,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:12⤵PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,18397259977505722053,8739065295933855201,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2672 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4696
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1580
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53e71d66ce903fcba6050e4b99b624fa7
SHA1139d274762405b422eab698da8cc85f405922de5
SHA25653b34e24e3fbb6a7f473192fc4dec2ae668974494f5636f0359b6ca27d7c65e3
SHA51217e2f1400000dd6c54c8dc067b31bcb0a3111e44a9d2c5c779f484a51ada92d88f5b6e6847270faae8ff881117b7ceaaf8dfe9df427cbb8d9449ceacd0480388
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD52b365f3f967b9eecfdbb7cf03acc236c
SHA165414d7c80736a570041e651c4d45cdc26f893ac
SHA256ce7e2fd28da9eb559af8c4ce1c7c52b0c16b9ade9ce14b818c7f863afb2995dd
SHA512edc4ff903afabda22c33e8dac2d392c7a46cd4b71d6680ab70640671f391a086dc870c1be7d6e003c234faa62fc710654ecf6ceb652464aef4cceeb7eb6420ee
-
Filesize
846B
MD5f12b985943ee881eb9800bcc131ee9e8
SHA1519d2d7316a377a855e44d4a7b71c1021c18c334
SHA25650b50f63bcce4eaf7512e2fcd56cc1f805c72be6d4b42bbd6f55d6fc8f323b1d
SHA512987293cae48449eae6a810f3cfdd933729e3dbe7f488c586626be3684148d3897c34cad84d9961278463d86def5990efb94d0c0676b3f35a7231b244b00ff2a5
-
Filesize
5KB
MD5f0c984348c3858c81dbaa505451eb573
SHA1bc506953abf14829505c1bc6653e370f338b42de
SHA2566fe04569d6c5853cbb652b64a5d5fdd9609235e30f5cedf0bae1b182b122066c
SHA51232233ecaef8168294afb61a730ff60fb2c425346b4441a6df6076be031482bcc5417695ed6c089ed261556a97389c7b902b9d32bd3a876d042e2114c2bc1613d
-
Filesize
5KB
MD558e86d3d471a5e49b3bc134ad121e62c
SHA1bd2ce4af5ff9cecd1aff46bfa917ae7dc306f4eb
SHA256487023e83db07509b4a85e8fce6fb87336d04513e9be295ed7ebf8895bfb54d3
SHA5127927c664e324f274a50346027c297c28647c88adf66d4f592c781e81097df2828e8a80e149e3581246ea2247fe268b961492f29e502c2419d0734f8007e41a3b
-
Filesize
24KB
MD51b1b142e24215f033793d1311e24f6e6
SHA174e23cffbf03f3f0c430e6f4481e740c55a48587
SHA2563dca3ec65d1f4109c6b66a1a47b2477afaf8d15306a523f297283da0eccbe8b1
SHA512a569385710e3a0dc0d6366476c457927a847a2b2298c839e423c485f7dcce2468a58d20133f6dc81913056fb579957e67f63cf1e20b910d61816210447cd1f1f
-
Filesize
1KB
MD51b8fcdc34e0e9d80e01713bde365ab4a
SHA11d9636f6f0a67dad3f2447bb18f67d3bad4ef8a0
SHA256ec82c3b1084fe4338c0eb0108acbdf0a59cbf7006fbb707431ac75dab3f1d2ee
SHA512c2e09059119781a17cd70ff89f52d472c48d8ff523511919df6c8cadeb5b4fa5cb5fc04a7640764232986cffa330fcd678f2a7f2337a3e29486d83e77fe61979
-
Filesize
1KB
MD50fb715aee90402a685a653ca1f5bc1c5
SHA1d1d207b771afd8b329b0a6fb5025527b5bb3ea51
SHA2563c02c395ba838bf54a699edff06774b401089ce5238e862ca8f7a8b61fbc8209
SHA512f8324d88a384495e0537536693a6fb70434238918ba7fa39968dbc0e31e82112e66869cff0824c540e6ff2f73ed7cf04fd7db029f7ac6fbedc6b4d871b1d17eb
-
Filesize
1KB
MD5e8a894075f14267c0d606486f2456de6
SHA1cb10f2388ad484ea7be0144e2e859e58565fbe12
SHA25643ced378266d06567788c072e73cbbd2b31e3d08e77bb91e78fff96d40aff33e
SHA5121bfbca00d0ef06ab57e9435dd59b569be860a2e3e6239fda6568869c31fda304840b3a5ee7313b7b83dfbc83a58a60476e99c1ba80647bf97a0b38dce9bdc448
-
Filesize
1KB
MD5e1de1acba5371518fd1b6aa3d91fa442
SHA15449eda2518a4c2a0911f729f9542460fa6ec5bc
SHA256cfebf4122aeb7c19c15c1ab2531974677d3543326dfe6930e749b7b577c424ea
SHA512febb355f3606d783a8584993eac5b0f3d777de6ee660be433217d08bebeb056562bed316fe084ac995ed50bd24891f52fe8e6815c7ab623d91d55ea9a6c9cac0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5badbc362a1fb874d16511bd2d15636f2
SHA130e078d46a565564c61139762b03e2c2dbf9effc
SHA2562ffd645e63d46870e87f1719378fa4bb9a3b0100f7295d5079397e1af2a0d54c
SHA512250b761d495604971dbc75459b6f46727e5341c08bad2e129d6e7d03ab0451befd03ee7a78f80ec403a4aef216722c8cad1dcd0ec4eeebe6206a9dd05130fb87